Loading

Introduction:

Jurisprudence can be defined as the science and philosophy or theory of the law. Applying jurisprudence to cyber law gives rise to the legal study that concentrates on the logical structure, the meanings and uses of its concepts, and the formal terms and modes of operation of cyber law. Cyberlaw is a very recent concept and if compared with other older branches of the law, is a little structured study.

The term cyberspace was originally coined by a science fiction writer William Gibson to depict data matrices existing in a dark distant future which means the information spaces made by the technology of digital networked computer systems that ultimately connect with the mother of all networks that is the Internet. With the advent of the internet and technology, cyberspace along with a number of crimes related to the same emerged and expanded. As we enter the cyber age, the law on all fronts is struggling to keep pace with technological advances in cyberspace. While there is a prosperous discussion of the nature of cyber law and its challenges, still a

fundamental body of scholarly contributions to the discussion is lacking. The outgrowth of cyber jurisprudence around the world has promoted the emergence of newer dimensions in Law. The focus is on the practical aspect of cybercrime with the initial attempt to extend the known physical society concepts to the virtual space rather than the theory, philosophy, and science of cyberlaw generally. Hence in due course, we need to develop separate Cyber Jurisprudence to deal with future disputes.

The modern jurists have been cautious to endow with the rationale pedestal of jurisprudence to this ruling and now ascertained utmost exact definition of cyber jurisprudence as this describes the principles of legal issues, which exclusively regulates the cyberspace and internet can be termed as cyber jurisprudence with a virtual approach[1]

Jurisprudential Aspects of Cyber Laws

Cyber jurisprudence gives an analysis of the land with land and no border, different from the physical world, they may be virtual from origin and nature. This covers the virtual world with virtual rules and policies, along with the virtual subject matter, virtual contracts, virtual disputes, virtual property, virtual possession, and virtual court.  

The existence of an item in the context of a virtual world, such as an e-mail account or an online game, is also a form of virtual property. It emphasizes the composite idea of cyber jurisdiction, cyber court’s venue in the cyberspace, and recognize uniform cyber rules and policies at the international level. Framing rules and laws to cover every aspect will be an arduous task since the cyber world has no boundaries.

However, a balance has to be maintained and laws be evolved in order to keep a check on cybercrimes.[2] Whenever a conflict is encountered in implementing existing laws of the real space to Cyber Space, the laws of the real space have prevailed, overtime this tendency is likely to develop into a principle of “Primacy of Meta Space” and become the bedrock of Jurisprudence.[3] However, the principle fails when two laws of the real space itself come into conflict in the Cyber Space.

Applying Jurisprudence to Cyber has three possible outcomes:

  • There exists no relationship between jurisprudence in general and cyber law in particular: Here we return to The Law of the Horse. Everything existing at present is sufficient and determining outcomes with a special view to cyber science is unnecessary. No special philosophy or theory of law is necessary to treat events occurring in cyberspace.
  • Such a relationship exists but it does not require a new jurisprudence to understand it: Here the cyber law is recognized as a special area of the law and acknowledges that current jurisprudential thinking is adequate to apply existing theory to its study and analysis.
  • A new jurisprudence and a new view of cyberlaw are necessary: This concludes that cyber law is a special and unique field of the law and it requires a special and unique philosophical and theoretical treatment of its own.

Eventually, the question of whether is it feasible and necessary to create an extensible jurisprudential approach to law that acknowledges and keeps pace with cyber science without being a set of restrictive and inhibitory guidelines that are both confining and resistant to change should be taken into consideration.

Evolution of Cyber Law

Cyber Crimes

In India, Cyber Crime is not directly defined by either IT Act, 2000, IT Amendment Act, 2008, or any Other Legislation. However, the Offence or Crime has been defined by The Indian Penal Code 1860: as any Offence or Crime in which a computer is used is a Cyber Crime. Cyber or Computer Crimes were defined as unethical, unauthorized, and illegal behavior of Individuals or as Groups relating to the automatic processing and transmission of data use of Computer Systems and Networks.

Cyber Crimes are majorly classified into four types:

  1. Against Individuals:
    1. Harassment through E-Mails / Messages
    2. Cyber-Stalking
    3. Propagation of Obscene Material on the Internet
    4. Defamation
    5. Hacking/Cracking
    6. Indecent Exposure.
  2. Against Property of an Individual:
    1. Computer Vandalism
    2. Transmitting Virus
    3. Internet Intrusion
    4. Unauthorized Control over Computer System
    5. Hacking / Cracking
  3. Against Organization:
    1. Hacking & Cracking
    2. Custody of Unauthorized Information
    3. using Cyber Terrorism in opposition to the Government Organization
    4. Distribution of Pirated Software
  4. Against Society at large:
    1. Pornography (especially Child Pornography)
    2. Spoil the Youth through Indecent Exposure
    3. Trafficking

In India, the Cyber Crimes have grown from 9,622 and 11,592 to 12,317 during 2014, 2015, and 2016 respectively.[4] The National Crime Records Bureau (NCRB) and Indian Computer Emergency Report Team (CERT-In) had reported that approximately 80 phishing incidents affecting 20 Financial Organization, 13 incidents affecting various Automated Teller Machines, Point of Sales systems, and Unified Payments Interface (UPI).

Legislations

The principal source of cyber law in India is the Information Technology Act, 2000 (IT Act) with the primary purpose to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government. This Act penalizes various cyber crimes and provides stringent punishments including imprisonment terms up to 10 years and compensation up to Rs 1 crore. Some of the major Acts got amended after the enactment of ITA:

  1. The Indian Penal Code, 1860: The word ‘electronic’ was added, thereby treating the electronic records and documents on a par with physical records and documents. The Sections dealing with false entry in a record or false document[5] have since been amended as ‘electronic record and electronic document’ to bring it within the ambit of IPC.
    Now, electronic records and electronic documents have been treated on par with physical records and documents during the commission of acts of forgery or falsification of physical records in a crime.
    The investigating agencies started filing the cases and charge-sheets quoting the relevant sections from IPC read with the ITA/ITAA in like offense in order to ensure that the evidence and/or punishment can be brought under its scope and be proved under either of these or both the legislation.
  2. The Indian Evidence Act 1872: Before enactment of ITA, all pieces of evidence in a court were in the physical form only and now the electronic records and documents were recognized as the definition part of Indian Evidence Act was amended as “all documents including electronic records”.
    Words like ‘digital signature’, ‘electronic form’, ‘secure electronic record’ ‘information’ as used in the ITA were also inserted after this amendment to be a part of the evidentiary importance under the Act.
    The identification and recognition of admissibility of electronic records as evidence as enshrined in Section 65B of the Act was seen as a significant amendment.
  3. The Bankers’ Books Evidence (BBE) Act 1891: Previously banks were required to produce the original ledger, other physical registers, and document during evidence before a Court but now the definitions part of the BBE Act stood amended as: “bankers ‘ books’ include ledgers, day-books, cashbooks, account-books and all other books used in the ordinary business of a bank whether kept in the written form or as printouts of data stored in a floppy, disc, tape or any other form of electromagnetic data storage device”[6].
    This amendment in the provisions in Bankers Books Evidence Act recognized the printout from a computer system and another electronic document as a valid document during evidence, provided, such print-out or electronic document is accompanied by a certificate by a person-in-charge of computer system.

Jurisdictional Cyber Issues

Theories of Jurisdiction

As far a cyber law is concerned, the jurisdiction encompasses several discrete concepts, including jurisdiction to prescribe, jurisdiction to adjudicate, and jurisdiction to enforce.[7] The prescribing jurisdiction is a sovereign entity’s authority to make applicable laws to the activities, relations, or status of persons, or the interests of persons in things by legislation, by administrative rule or by determination of a court, by executive act or order and jurisdiction to adjudicate is a sovereign entity’s authority to subject persons or entities to the process of its courts or administrative tribunals to determine whether prescriptive law has been violated.[8] There are various theories of jurisdiction:

  1. Territoriality Theory: It means that a sovereign state has the authority to judge criminal acts that have been committed in its territory. The place where the crime is committed has to be established for this to apply.
  2. Nationality Theory: Also known as Personality theory, recognizes that a sovereign state can adopt criminal laws that govern the conduct of nationals while outside of its borders. This principle effectively makes it a crime for its nationals to engage in conduct that is not illegal in the place where the conduct is performed. This theory is further dealt with in two ways:
    1. Active Nationality Theory: This theory recognizes that a state may exercise criminal jurisdiction over its nationals based on their active nationality and can prosecute and punish its sovereign nationals for committing a crime outside its territory.
    2. Passive Nationality Theory: This theory provides for a sovereign to adopt criminal laws that apply to foreign nationals committing crimes against the sovereign’s nationals while the sovereign’s nationals are outside of the sovereign’s territory.
  3. Protection Theory: This theory provides for a sovereign to adopt a statute that criminalizes conduct that occurs outside of its borders and when that conduct affects the sovereign itself. The sovereign can make it a crime to engage in an act that obstructs the function of government or threatens its security as a state without heed to where or by whom the act is committed.
  4. Universality Theory: This theory provides for a sovereign to adopt criminal laws applicable to the conduct performed by any person anywhere in the world when such conduct is recognized by nations as being of universal concern.
  5. Derived Jurisdiction Theory: This theory cannot be treated as an independent basis for jurisdiction. If the state that has jurisdiction, so determines or authorizes a state that has no jurisdiction over certain acts according to its national laws or case law and embodied principles then it may assume jurisdiction. This can be carried out in the form of a formal request or based on an international treaty.

Principles of Jurisdiction

  1. Territoriality Principle:
    • if one of the acts constituting an element of the offense has been committed in the territory then the offense is said to be committed within the territory of a state
    • if the effects of the offense became manifest there.
  2. The Flag Principle: This principle is considered to be a variant of the territoriality principle and it applies if the cybercrime is committed on a ship or aircraft that is beyond the territory of the Flag party, the state of registry will be the one exercising jurisdiction over the offense.
  3. Nationality Principle: It applies the active nationality principle. It gives an obligation to nationals of a state to comply with the domestic law even when they are outside its territory. This prevents nationals of a state to travel to a foreign state to commit a cybercrime and return without the risk of being prosecuted.

Is the internet a vanishing point of law?

There is a controversy like cyber law as to the question, whether cyber law is a law or not. The emergence of cyberlaw has an inseparable yet precarious connection to the analytical tradition in jurisprudence. It is said that Law cannot function in free space or vacuum as it seeks a definite place and people voluntarily abiding by it. But if law requires some definite place to be operated and few individuals consciously abiding by it, then what is the need for recognizing a group of individuals as a society and for making separate rules for their governance? Above all, is it mere physical existence or is there any other thing that substantiates the matter which makes a group of individuals as society?

There is demand for resolving these questions while using the term “cyber society” and its nature. Technological inventions have created and developed products that enable people to meet, talk and live in cyberspace in ways not possible in the real space whereas information technology has facilitated processes like the process of buying, communicating, sharing ideas, etc. Cyberspace comparatively has more intimate, accurate, and unceremonious aspects.

The internet as a medium of interaction is growing exponentially with individuals facilitating each other with mailing, shopping, sharing online news, etc., and this ability of online users to communicate in sophisticated ways form “virtual communities”.

The term ‘cyber society’ or ‘cyber community’ is discreetly used by social thinkers, lawyers, and research scholars to refer to internet users due to its accessibility to every individual. And the same paved the way for the sharing of ideas, moods, and building of common interests and consensus. Now leaving laws to be built on the premise of this consensus itself. Law has to identify the common principles, customary practices, cultures, usages and the basic norm, etc. on which the cyber society is working and what norms are governing them out of such commonalities has to formulated.

Jurists like Sir John Austin, Salmond, Sir Frederick Pollock, etc. have evolved many schools of thought and gave possible propositions to the jurisprudence in accordance with the physical society but as far as cyber society is concerned, jurisprudence is not yet formulated and is still in the realms of legal academia. Ironically the ‘cyber society’ is more of a reality today than it was ever before as the Internet has a stake in the economies of the world and seized popular imagination by furnishing easy communication, entertainment, leisure, and relaxation.

The law needs to be in sync since the Internet is continually changing the dynamics of the world. It must be flexible, overhauled continuously, and refitted continually as well as stable to the change in social life which it is to govern. There is a viewpoint that the cyber laws are followed by states by courtesy and are much weaker than their counterparts in the municipal law. As it cannot be strictly contented that cyber law is not enacted by the sovereign or that it has no agency for enforcement and sanction, it is now well settled that cyber law is the law even if it’s considered as weak law.

Conclusion

The existing laws of India, even with a liberal interpretation cannot interpret all aspects involving the internet, World Wide Web, and different activities in cyberspace as every action and reaction has some cyber legal angles. Should the flow of information or the place where information is flowing be regulated when one or the other device, whether ethical (self) or institutional is carrying on activities in cyberspace? Or is it the subjects that are the individuals who are accessing the information to be regulated? 

Some significant legal status has to be invariably attributed to cyberspace, if it is the place where information is flowing, to be regulated and accordingly the character, nature, jurisdiction, and functions of the cyberspace have to be deliberated. Whereas if the subject matter of law are the individuals, then they be are in physical space using physical devices themselves. Here the existing laws suffice to clampdown misuse of IT and to curb technological malpractices. There is no need to search terminologies to name the crime committed or establishing new institutions like cyber police stations, cybercops etc.

An arduous task in this approach is that at times it becomes impossible to trace out the individual behind a crime committed and unfeasible to expect that every cyber offense originates from physical space. If it is the ‘information’ that has to be regulated by the law then the horizons of the IT law should be so expended to deal with the production, distribution, dissemination, processing of information as a whole.

The notion of jurisprudence in criminal law or law of torts can be intercepted and applied similarly for the comprehension of cyber law due to the offered polyphonic views of the interaction and consequences by an actor’s negative acts accompanied by the actor’s victim. This is an era where cyber-attacks could range from inconvenience to death. Hence there is rising demand for a jurisprudence of cyberlaw but that jurisprudence does not dictate a completely new body of laws.


References:

[1] http://www.articlesbase.com/cyber-law-articles/cyber-jurisprudence-a-developing-concept-561596

[2] Cyber Law Encyclopedia, www.gahtan.com/cyberlaw

[3] Ahmed, Dr. Zulfiquar ; Cyber Law in Bangladesh, Published by- Sheikh Mohammad Ali Hasan, National Law Book Company, Nilkhet, Dhaka-1205.

[4] TOI, 05th Jan, 2018

[5] e.g. S. 192, 204, 463, 464, 464, 468 to 470, 471, 474, 476 etc

[6] Section 2(3), The Bankers’ Books Evidence (BBE) Act 1891

[7] United States v. Yousef, 327 F.3d 56, 99 (2d Cir. 2003)

[8] Supra n. 4.

Other Sources:

  1. Michael A. Geist, Is There a There There? Toward Greater Certainty for Internet Jurisdiction, 16 BERKELEY TECH LAW JOURNAL, 1345, 1356 (2001)
  2. Dr. Kasperson, Cybercrime and Internet Jurisdiction, (Council of Europe, Economic Crime Division, France, Discussion Paper, March 5, 2009), (2009)
  3. Jeffrey Pollock and Debra Lightner, Civil Procedure in the Age of the Internet Jurisdiction, NEW JERSEY LAW JOURNAL (August 14, 2000).
  4. Cyber Crime Survey Report Insights and Perspectives (2017), KPMG.
  5. AbhaChauhan (2012)., Evolution and Development of Cyber Law- A Study with Special Reference to India, SSRN Journals.
  6. Peter R. Stephenson PhD, Defining a Cyber Jurisprudence 2017
  7. Mukesh Dwivedi, Laws Relating to Cyber Crimes: Theories and Legal Aspects
  8. UNESCO, The COE International Convention On Cybercrime Before Its Entry Into Force (Copyright Bulletin), January–March 2004.
  9. Council of Europe, Convention on Cybercrime, CETS No.: 185, (2014).
  10. http://portal.unesco.org/culture/en/ev.php, 20.02.2016.
  11. http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG, 20.02.2016. 


0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *